Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-12-2023 20:47

General

  • Target

    67919b0634da4cc3964f488591da7ca4a5eded0aa620c47095331e77a1c55898.exe

  • Size

    7.6MB

  • MD5

    5c7f8bf08c17925703ce861adf804beb

  • SHA1

    27e55a76fa9a92802a7dad415815ab23b4b0575f

  • SHA256

    67919b0634da4cc3964f488591da7ca4a5eded0aa620c47095331e77a1c55898

  • SHA512

    3da17b047bfa123e5d1d95eed98ca825a9c2fe264bb47aee1badc9f41cdb47797021a1500ba740601b357507966e24500a5e78ed5d965126ecafba047c33941f

  • SSDEEP

    196608:onnY8NWvGpWTTlm0OxwW+nFnfZsMUdFt30Dzj:onnY8NELTIrxwlxQWDzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67919b0634da4cc3964f488591da7ca4a5eded0aa620c47095331e77a1c55898.exe
    "C:\Users\Admin\AppData\Local\Temp\67919b0634da4cc3964f488591da7ca4a5eded0aa620c47095331e77a1c55898.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\is-KMOEF.tmp\67919b0634da4cc3964f488591da7ca4a5eded0aa620c47095331e77a1c55898.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-KMOEF.tmp\67919b0634da4cc3964f488591da7ca4a5eded0aa620c47095331e77a1c55898.tmp" /SL5="$50236,7715663,68096,C:\Users\Admin\AppData\Local\Temp\67919b0634da4cc3964f488591da7ca4a5eded0aa620c47095331e77a1c55898.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3324
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4924
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:2748
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2212
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 11
            4⤵
              PID:316
          • C:\Program Files (x86)\PlayGIF\gifplayer.exe
            "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
            3⤵
            • Executes dropped EXE
            PID:4684

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.4MB

        MD5

        f444b2749d5d82313d253302c590a969

        SHA1

        7d39fc1ae76d0fdeb8845825ba572a069013012b

        SHA256

        734b81af018bf27f1d4ac27aa6ed3e28a6d837f73b0b31cea752fc64131651d8

        SHA512

        c0031ad7c5a52f6610c342af31956620a897c08ed64edc55c6981159beb294b5293e69e7ea9e979de15d2f885a1f4b9a9851be42692f2ac09cd5d60aec0b2ffe

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.3MB

        MD5

        1d9f9d0d6b1db57a43b430dc2e08dbbe

        SHA1

        1661159d9a0b21f0e46a06c65d414923af6975ab

        SHA256

        8b986e30a5286da3fa6463c7f9874167f0ca055db7810ee587f94d6507c3843d

        SHA512

        f58e391d856e9ab116e782d32644d9e76793ff442e936288a9251cb9344bacc99330438d49c2e05be2bcd92ca65a60035212ffef89671d9cc464cb039c59e523

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.3MB

        MD5

        bf9a4707ecbe300beadee1a90aa84dc5

        SHA1

        845c66fe7991bd867002bc42170fd84c8e4ce566

        SHA256

        44e6af37a7b48b17e93a04d4730734b9c017c36a04efebe080405d7826ad4209

        SHA512

        6c15c18684702e4416b04f6b15a980bbc0f13453efefdf9c4e16cf0fcd05ef78dff9fffe3e8c9ef813680cac5d156c6bbfcac999431d72d75d4cde67bebcd073

      • C:\Users\Admin\AppData\Local\Temp\is-KMOEF.tmp\67919b0634da4cc3964f488591da7ca4a5eded0aa620c47095331e77a1c55898.tmp

        Filesize

        315KB

        MD5

        4665f494b137fe98dcb1832c7fff312a

        SHA1

        9b16983efc8f01159b61b2b9c081321dda2f7f7b

        SHA256

        6ed944764047d2460997508551f4027fff4e64ab5c83c489c9ef7c11c6bec5a5

        SHA512

        86205f00f9e5fd829e885362a567632db36d912f08802aed57e0418977de04e15e7de4b2b0d74c0e2941f652841416b07837a8edbf9502546aeab9d6a4db42d3

      • C:\Users\Admin\AppData\Local\Temp\is-KMOEF.tmp\67919b0634da4cc3964f488591da7ca4a5eded0aa620c47095331e77a1c55898.tmp

        Filesize

        292KB

        MD5

        7cd8da2c136e68f3e9490c5132ba6a14

        SHA1

        c1712e4ba3a4296268910af3d468c81772ba10c7

        SHA256

        f486831024dfa6ca48e2129bcbfdb3721281c0e95a814e2f096f1a4646ca6e40

        SHA512

        e76d39a14508e3a7656e3704834118cb93292b4f61de270114ac97c0b9a388f842c5a4120193971ae845e84bd7163c137c6dcc9ada9e480fe097739ea2b2a0bf

      • \Users\Admin\AppData\Local\Temp\is-314I3.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-314I3.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/3324-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/3324-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3324-19-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/3516-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3516-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3516-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4684-179-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-192-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-158-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-207-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-162-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-204-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-166-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-167-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-170-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-173-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-176-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-201-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-180-0x0000000000940000-0x00000000009DE000-memory.dmp

        Filesize

        632KB

      • memory/4684-185-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-188-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-189-0x0000000000940000-0x00000000009DE000-memory.dmp

        Filesize

        632KB

      • memory/4684-159-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-195-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4684-198-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4924-151-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4924-152-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4924-155-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB